Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 02:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe
Resource
win7-20240729-en
windows7-x64
8 signatures
150 seconds
General
-
Target
df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe
-
Size
65KB
-
MD5
df4e8fbaf4e9aea8eba28a773bd68283
-
SHA1
ff6e2a833f6f02f3f1baff03e9c4dd35d086cc2e
-
SHA256
611e4688ec83a89298c8360ab21d3be95d54db67657d3b876c4c459cec4ffd83
-
SHA512
55b957613881748f8e86b93b153f27fdb6b0f330630622b52bb5380739f19c8767d6906ebe5fb36228c529d7788c019403a46467614b4b4e8ad252f461eab1be
-
SSDEEP
1536:35EHpgcVVRF52aEgvWi4Q34FNtOAND4YafN1GK8:kbV7MZM2dH54P6
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wcstuip.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 wcstuip.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wcstuip.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wcstuip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcstuip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcstuip.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wcstuip.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wcstuip.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wcstuip.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3296 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 3296 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 3604 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 3604 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 4212 wcstuip.exe 4212 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe 3004 wcstuip.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3604 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3296 wrote to memory of 3604 3296 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 83 PID 3296 wrote to memory of 3604 3296 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 83 PID 3296 wrote to memory of 3604 3296 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 83 PID 4212 wrote to memory of 3004 4212 wcstuip.exe 95 PID 4212 wrote to memory of 3004 4212 wcstuip.exe 95 PID 4212 wrote to memory of 3004 4212 wcstuip.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3604
-
-
C:\Windows\SysWOW64\wcstuip.exe"C:\Windows\SysWOW64\wcstuip.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\wcstuip.exe"C:\Windows\SysWOW64\wcstuip.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3004
-